TRACs Security Awareness FY2009 Office of Information Technology Security 1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Springfield Technical Community College Security Awareness Training.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Crime and Security in the Networked Economy Part 4.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Program Objective Security Basics
Digital Citizenship By: Miranda Scorver.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Chap1: Is there a Security Problem in Computing?.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
3.6 Fundamentals of cyber security
IT Security  .
Information Security 101 Richard Davis, Rob Laltrello.
Answer the questions to reveal the blocks and guess the picture.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Risk of the Internet At Home
Faculty of Science IT Department By Raz Dara MA.
Presentation transcript:

TRACs Security Awareness FY2009 Office of Information Technology Security 1

Course Objectives Why Is Cybersecurity Important? How Can I Be a Safe User? How Can I Help Protect HUD and Its Information? 2

Overview CyberSecurity Goals Managing and Understanding CyberSecurity Risks CyberSecurity and Protecting HUD Information and Computer Network Threats Impacts Vulnerabilities 3

CyberSecurity Goals Confidentiality – Limiting access to information to authorized persons only Integrity – Protecting information from unauthorized or unintentional modification Availability – Ensuring that information and resources are available to those who need it when they need it 4

Risks & Risk Management 5 Risk is the danger that is posed to a protected object by a combination of threats & vulnerabilities

Components of Risk Threat: Any person, event, or environmental factor that could impact or harm a Protected Object Vulnerability: A weakness that can be exploited by a threat. It is the hole through which a threat gains access to a protected object Impact: The way a protected object could be affected or harmed by a threat 6

Threats A threat is any person, event, or environmental factor that could impact or harm a protected object. Threats can be either active or passive. Active Threats:Passive Threats: Hackers Cyber warfare Malicious code Information gathering Identity theft Hurricanes Power failure Software glitches Human error 7

Threats: Hackers What is it? Unauthorized access to information or computer systems Examples include anti-government groups a "kid in the basement“ a disgruntled employee Criminals Trained cyber warriors How can it harm? Loss of Data Identity Money Credibility System availability 8

Threats: Hackers Do Be suspicious Be careful with your Personal data Passwords Sensitive organizational information Report suspicious activity Practice security habits at all times and in all places Don't Give out non-public information about yourself or your organization Follow directions of others without confirming the person's authorized role Attempt to modify or bypass security measures 9 What can I do?

Threats: Cyber Warfare What is it? An organized attack against a computer system or network by a hostile group. It is often used as part of a physical warfare strategy.hostile group How can it harm? Impair nation's economy, critical infrastructure, or our ability to fight a physical war.critical infrastructure What can I do? Follow security guidelines and policies 10

Threats: Malicious Code What is it? Software designed to: disrupt the normal operations allow an unauthorized access Often called "viruses” Examples: Viruses Worms Trojan Horses Adware or Spyware 11

Threats: Malicious Code How can it harm? Sharing sensitive data with unauthorized persons Performance malfunctions including computer crashes Files and records destruction Connection overload causing denials of service 12

Threats: Malicious Code Do Only accept files from valid sources Scans files from outsiders for malicious code Ensure antivirus software is installed and kept up-to-date Don't Download files from questionable sources Modify or disable antivirus software Load suspicious media on your computer 13 What can I do?

Threats: Information Gathering What is it? Collecting personal or sensitive information that an attacker can use to bypass security systems. Common techniques: Shoulder surfing Dumpster diving Data mining Searching online sources Social engineering Phishing 14

Threats: Information Gathering How can it harm? Loss of Data Identity Money Credibility or Reputation 15

Threats: Information Gathering Check your surroundings Be suspicious Verify identities Safeguard personal information Don’t volunteer information Check security settings on the web Shred sensitive material Contact organizations by telephone if there is any doubt as to the authenticity of an or Web site 16 What can I do?

Threats: Identity Theft What is it? A crime in which someone wrongfully obtains and uses another person's personal data in a way that involves fraud or deception. Items often stolen are: ID badges, user names and passwords, social security numbers and credit card or bank account information. 17

Threats: Identity Theft How can it harm? Obtain credit in you name Incur fraudulent charges Open accounts Access anything your identity is used to protect. What can I do? Protect your personal information and that of others 18

Threats Summary 19 Immediately call HUD’s Call Center at If you encounter suspicious events on a HUD System: If you receive an at home that appears suspicious, call or contact the organization listed in the From line before you respond or open any attached files

Vulnerabilities A vulnerability is a weakness that can be exploited by a threat. It is the hole through which a threat gains access to a protected object. Common vulnerabilities include: Weak or unprotected credentials or passwords Program installation or modification Peer-to-peer software File transfers Removable media 20

Vulnerabilities: Weak or Unprotected Credentials & Passwords What is it? The use of credentials to confirm a user's identity and grant access to a computer system. How can it harm? Allowing unauthorized access to HUD’s network Data breaches, theft or unauthorized modification 21

Vulnerabilities: Weak or Unprotected Credentials & Passwords What can I do? Keep your credentials (your passwords and smart cards) safe. Protect them like you do the keys to your home Never allow another person to use your credentials to log in as you. 22

Vulnerabilities: Weak or Unprotected Credentials & Passwords Do’s Select a unique password of 8 characters or more Use 3 of the 4 available character types including caps, numbers & symbols Change passwords as necessary Think creatively when creating passwords Don’t Share passwords with anyone Use the same password for multiple accounts Create group passwords Write down passwords Base passwords on information that might be guessed Begin your password with a real word 23 What can I do?

Vulnerabilities: Program Installation or Modification What is it? Program installation refers to loading software onto Department computers. Program modification refers to changing the settings of existing programs. 24

Vulnerabilities: Program Installation or Modification How can it harm? Hackers often use software vulnerabilities to exploit a network Every software program used by HUD is tested first and configured for safe use New programs or settings that have not been tested or controlled by system managers can create unknown vulnerabilities 25

Vulnerabilities: Program Installation or Modification What can I do? Understand how your business relies on information and information technology No non-standard software without prior approval Do not download or install unauthorized programs Do not make changes to security settings 26

Vulnerabilities: File Transfers What is it? Term used to describe the movement of files between computers. Common methods include: Downloading files from the Internet Receiving attachments Copying files from removable media like CDs, floppy disks, and USB drives Peer to Peer 27

Vulnerabilities: File Transfers How can it harm? Inadvertent introduction of malicious code The most common source of virus infection is attachments, followed by Internet downloads 28 What can I do? Before transferring anything to your computer, consider: Rule 1: If you don't need it, don't download it! Rule 2: If you need it, do you trust the source? Rule 3: Scan files that are coming from outside the Department with virus protection software before opening

Vulnerabilities Summary 29 Immediately call to HUD’s Call Center at a security incident if you encounter suspicious events on a HUD System:

Impact The way a protected object could be affected or harmed The way your mission operations could be affected or harmed 30 “It’s all about protecting the information, not computers.” Ira Winkler, The Grill Interview, Computerworld, July 28, 2008

Minimizing Impact Actively manage security risks Building Security In Reducing Exposure Standardizing Operations Enhancing Awareness and Competencies Act Securely 31

Minimizing Impact What information does your mission rely on? Where does that information reside? Who has access to that information? How reliable or accurate is that information? What is the back up plan should that information become unavailable? 32

Joyce M. Little Director, Policy and Management Division Office: Fax: Marian P. Cody Chief Information Technology Officer Office: Cell: Fax: John S. Hawkins Security Awareness and Training Office: Fax: Contact Information: 33